Re: Speed and security of /dev/urandom
On 18.07.2014 3:41, Steven Chamberlain wrote:
> Is there a good reason arc4random_buf() can't take bytes directly from
> /dev/urandom or sysctl KERN_ARND? Therefore no longer needing to seed
> first, periodically reseed, or use any stream cipher?
One of the reason I hear is that true random entropy bits can be quickly
exhausted if every userland program will drain them so much.
--
http://ache.vniz.net/
_______________________________________________
freebsd-security@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-security
To unsubscribe, send any mail to "freebsd-security-unsubscribe@freebsd.org"
討論串 (同標題文章)
完整討論串 (本文為第 9 之 24 篇):